Power allocation strategies are devised to maximize the network lifetime of amplify-and-forward (AF) cooperative networks in this work. We consider the scenario where one source an...
As networks become faster there is an emerging need for security analysis techniques that can keep up with the increased network throughput. Existing network-based intrusion detec...
Connectivity in wireless ad hoc and sensor networks is typically analyzed using a graph-theoretic approach. In this paper, we investigate an alternative communication-theoretic app...
Sooksan Panichpapiboon, Gian Luigi Ferrari, Ozan K...
Abstract. In this paper, we propose a framework for the security analysis of on-demand, distance vector routing protocols for ad hoc networks, such as AODV, SAODV, and ARAN. The pr...
— We present a networked control scheme which uses a model based prediction and time-stamps in order to compensate for delays and packet dropouts in the transmission between sens...